Game theoretic approach to optimize the throughput of cognitive radio networks in physical layer attacks

被引:13
作者
Ahmadfard, Arash [1 ]
Jamshidi, Azizollah [1 ]
Keshavarz-Haddad, Alireza [1 ]
机构
[1] Shiraz Univ, Sch Elect & Comp Engn, Commun & Elect Dept, Shiraz, Iran
关键词
Cognitive radio; intelligent systems; physical layer attack; game theory; optimization; USER EMULATION ATTACKS; SYSTEMS;
D O I
10.3233/IFS-141413
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cognitive Radio (CR) is an adaptive, intelligent radio technology that can automatically detects available channels in a wireless spectrum and change transmission parameters to allow more concurrent wireless communications in a given spectrum band at a location. Physical layer attack is a common attack in these networks which can degrade the performance of cognitive radio networks severely. In this attack, the attacker mimics the signals of the Primary Users (PU) to mislead the cognitive users about the existence of the primary users. Two physical layer attack approaches are studied in this paper. First, we have considered the case that the cognitive users are united against the attacker to maximize the network total throughput. Second, we have studied the case that the cognitive users are selfish but have a common attacker. In both cases, we have assumed that the cognitive network employs carrier sense multiple access with collision avoidance (CSMA/CA) to prevent collisions. We use the game theory approach to model the optimization problem and then try to solve it. Some simulations are conducted to evaluate the cognitive network performances.
引用
收藏
页码:1281 / 1290
页数:10
相关论文
共 21 条
[1]  
Bertsekas D P., 1995, NONLINEAR PROGRAMMIN, P223
[2]  
Boyd S., 2004, CONVEX OPTIMIZATION, P138
[3]   Defense against primary user emulation attacks in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Reed, Jeffrey H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :25-37
[4]   Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks [J].
Chen, Zesheng ;
Cooklev, Todor ;
Chen, Chao ;
Pomalaza-Raez, Carlos .
2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, :208-215
[5]   A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks [J].
Fragkiadakis, Alexandros G. ;
Tragos, Elias Z. ;
Askoxylakis, Ioannis G. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :428-445
[6]  
HALLDORSSON MM, 2004, ACM S PRINC DISTR CO, P107
[7]   Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks [J].
Jin, Z. ;
Anand, S. ;
Subbalakshmi, K. P. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (09) :2635-2643
[8]  
Jin Z., 2009, ACM SIGMOBILE Mob. Comput. Commun. Rev, V13, P74, DOI DOI 10.1145/1621076.1621084
[9]  
Jin Z, 2009, 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, P1
[10]   Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks [J].
Jo, Minho ;
Han, Longzhe ;
Kim, Dohoon ;
In, Hoh Peter .
IEEE NETWORK, 2013, 27 (03) :46-50